![SMC Networks 7824M/FSW - annexe 1 Скачать руководство пользователя страница 170](http://html.mh-extra.com/html/smc-networks/7824m-fsw-annexe-1/7824m-fsw-annexe-1_management-manual_1300676170.webp)
C
LIENT
S
ECURITY
7-2
• DHCP Snooping
5
– Filters IP traffic on unsecure ports for which the
source address cannot be identified via DHCP snooping nor static
source bindings. (See “DHCP Snooping Commands” on page 22-10.)
Configuring Port Security
Port security is a feature that allows you to configure a switch port with
one or more device MAC addresses that are authorized to access the
network through that port.
When port security is enabled on a port, the switch stops learning new
MAC addresses on the specified port when it has reached a configured
maximum number. Only incoming traffic with source addresses already
stored in the dynamic or static address table will be accepted as authorized
to access the network through that port. If a device with an unauthorized
MAC address attempts to use the switch port, the intrusion will be
detected and the switch can automatically take action by disabling the port
and sending a trap message.
To use port security, specify a maximum number of addresses to allow on
the port and then let the switch dynamically learn the <source MAC
address, VLAN> pair for frames received on the port. Note that you can
also manually add secure addresses to the port using the Static Address
Table (page 10-1). When the port has reached the maximum number of
MAC addresses the selected port will stop learning. The MAC addresses
already in the address table will be retained and will not age out. Any other
device that attempts to use the port will be prevented from accessing the
switch.
Command Usage
• A secure port has the following restrictions:
- It cannot be used as a member of a static or dynamic trunk.
- It should not be connected to a network interconnection device.
Содержание 7824M/FSW - annexe 1
Страница 2: ......
Страница 24: ...TABLE OF CONTENTS xxiv ...
Страница 28: ...TABLES xxviii ...
Страница 32: ...FIGURES xxxii Figure 16 3 DNS Cache 16 7 ...
Страница 34: ...GETTING STARTED ...
Страница 46: ...SYSTEM DEFAULTS 1 12 ...
Страница 62: ...SWITCH MANAGEMENT ...
Страница 74: ...CONFIGURING THE SWITCH 3 12 ...
Страница 112: ...BASIC MANAGEMENT TASKS 4 38 ...
Страница 168: ...USER AUTHENTICATION 6 30 ...
Страница 223: ...SHOWING PORT STATISTICS 9 33 Figure 9 12 Port Statistics ...
Страница 230: ...ADDRESS TABLE SETTINGS 10 6 ...
Страница 304: ...CLASS OF SERVICE 13 16 ...
Страница 316: ...QUALITY OF SERVICE 14 12 ...
Страница 338: ...MULTICAST FILTERING 15 22 ...
Страница 346: ...DOMAIN NAME SERVICE 16 8 ...
Страница 348: ...COMMAND LINE INTERFACE IP Interface Commands 35 1 ...
Страница 362: ...OVERVIEW OF COMMAND LINE INTERFACE 17 14 ...
Страница 426: ...SYSTEM MANAGEMENT COMMANDS 19 56 Example Console show calendar 15 12 34 February 1 2002 Console ...
Страница 494: ...USER AUTHENTICATION COMMANDS 21 48 ...
Страница 514: ...CLIENT SECURITY COMMANDS 22 20 ...
Страница 540: ...ACCESS CONTROL LIST COMMANDS 23 26 ...
Страница 558: ...INTERFACE COMMANDS 24 18 ...
Страница 576: ...MIRROR PORT COMMANDS 26 4 ...
Страница 582: ...RATE LIMIT COMMANDS 27 6 ...
Страница 616: ...SPANNING TREE COMMANDS 29 28 ...
Страница 644: ...VLAN COMMANDS 30 28 ...
Страница 664: ...CLASS OF SERVICE COMMANDS 31 20 ...
Страница 678: ...QUALITY OF SERVICE COMMANDS 32 14 ...
Страница 720: ...APPENDICES ...
Страница 726: ...SOFTWARE SPECIFICATIONS A 6 ...
Страница 730: ...TROUBLESHOOTING B 4 ...
Страница 746: ...INDEX Index 6 ...
Страница 747: ......